Midterm chapter 4
To convert host names to IP addresses on the Internet, ____________ is used.
DNS
For a Class C IPv4 address, what is the correct default subnet mask value, specified as either a dotted decimal address or a CIDR value? (Choose all that apply.) a. /24 b. 255.255.255.0 c. C::/24 d. 255.0.0.0 e. 255.255.256.0
a. /24 b. 255.255.255.0
Which of the following IPv4 addresses have the same network ID as 10.16.112.45 given the subnet mask 255.255.0.0? (Choose all that apply.) a. 10.16.160.45 b. 192.168.172.46 c. 10.16.122.2 d. 10.16.185.45 e. 10.18.114.3
a. 10.16.160.45 c. 10.16.122.2 d. 10.16.185.45
A computer has the IPv4 address 192.168.0.23 and a subnet mask of 255.255.255.0. Which of these addresses represents a possible default gateway address? (Choose all that apply.) a. 192.168.0.254 b. 192.168.0.1 c. 127.0.0.1 d. 0.0.0.1 e. 193.168.0.1
a. 192.168.0.254 b. 192.168.0.1
Which IPv4 configuration options must be configured properly to communicate with websites on the Internet? (Choose all that apply.) a. A default gateway b. WINS c. A subnet mask d. An IP address e. DNS
a. A default gateway c. A subnet mask d. An IP address e. DNS
Your company is looking at securing connectivity between an internal server and workstations on the local area network. The network infrastructure does not support VLAN technology to compartmentalize network traffic, so they ask you for an overall design plan using Windows Defender Firewall with Advanced Security. Computers are required to confirm their identity when they communicate with one another using IPSec. For which of the following should your plan reference specific rules? (Choose all that apply.) a. Connection security rules b. IPSec token rules c. Routing table rules d. Inbound rules e. Outbound rules
a. Connection security rules d. Inbound rules e. Outbound rules
Your computer is configured to obtain an IPv4 address and DNS server address automatically. Which utility will help you to find the IPv4 address of your computer? (Choose all that apply.) a. Get-NetIPConfiguration b. netsh c. Get-NetIPAddress d. ipconfig e. arp
a. Get-NetIPConfiguration b. netsh c. Get-NetIPAddress d. ipconfig
Which protocol is used by the Client for Microsoft Networks and File and Printer Sharing for Microsoft Networks to communicate with one another and share files? a. SMB b. IPv6 c. IPv4 d. FTP e. HTTP
a. SMB
Which method can be used to assign IPv4 configuration settings when a DHCP server is not available? (Choose all that apply.) a. Static configuration b. DNS c. WINS d. APIPA e. Alternate IP configuration
a. Static configuration d. APIPA e. Alternate IP configuration
Your computer is configured to obtain an IPv4 address and DNS server address automatically. Network traffic is not flowing as expected. You are asked by your manager to output the current IPv4 routing table. What commands can you use to display the IPv4 routing table? (Choose all that apply.) a. netstat b. Get-NetRoute c. Get-RouteIPv4Table d. route e. nslookup
a. netstat b. Get-NetRoute d. route
Which of the following IP addresses is a valid IPv4 address and can be used by a host on the global Internet? (Choose all that apply.) a. 192.168.0.55 b. 172.32.0.1 c. 169.254.99.208 d. 38.15.222.299 e. 99.99.99.99
b. 172.32.0.1 e. 99.99.99.99
Which Internet connection type is most likely to require the use of PPPoE? a. Dial-up b. DSL c. Wireless hotspot d. Cable
b. DSL
Your company requires computers to authenticate to one another and enforces this requirement with Windows Defender Firewall with advanced security rules. You are asked to customize exceptions based on specific IP ranges. This can be done with a(n) _____ connection security rule. a. inbound b. authentication exemption c. isolation d. outbound e. server-to-server
b. authentication exemption
Which utilities can be used to perform advanced firewall configuration? (Choose all that apply.) a. Device security b. netsh c. Group Policy d. Windows Defender Firewall with Advanced Security e. Windows PowerShell
b. netsh c. Group Policy d. Windows Defender Firewall with Advanced Security e. Windows PowerShell
Which of these addresses represents a valid loopback address? (Choose all that apply.) a. ::/0 b. FF::1 c. ::1 d. 127::1/32 e. 127.0.0.1
c. ::1 e. 127.0.0.1
Which of the following IPv4 addresses is a valid IPv4 address and has the same network ID as 192.168.112.45 given the subnet mask 255.255.255.0? a. 10.0.0.45 b. 192.168.113.46 c. 192.168.112.257 d. 192.168.112.5 e. 172.16.112.45
d. 192.168.112.5
_____________ provides you with a way to control how your computer views other computers on the network and advertises its presence on the network. a. Windows Defender Firewall b. SMB c. IPv6 d. Network discovery e. Network location
d. Network discovery
Which of these addresses represents a valid IPv6 global unicast address? a. 2001::1::FEA b. FF::1:2 c. 169.254.12.1/64 d. FE80::2cab:2a76:3f57:8499 e. 2001:0:4137:9e74:2cab:2a76:3f57:8499
e. 2001:0:4137:9e74:2cab:2a76:3f57:8499
Which of these addresses represents a valid IPv6 link-local address? a. ::1 b. 2001:0:4137:9e74:2cab:2a76:3f57:8499 c. FF::1:2 d. 169.254.12.1 e. FE80::2cab:2a76:3f57:8499
e. FE80::2cab:2a76:3f57:8499
A Wi-Fi access point with a non-broadcasting SSID is not discoverable through any means unless a Wi-Fi client is configured to connect to it in advance. True or False?
False